Numeric Errors Affecting kernel-uek-debug package, versions <0:2.6.32-300.38.1.el5uek
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE5-KERNELUEKDEBUG-2471218
- published 10 Apr 2022
- disclosed 3 Oct 2012
Introduced: 3 Oct 2012
CVE-2012-3412 Open this link in a new tabHow to fix?
Upgrade Oracle:5
kernel-uek-debug
to version 0:2.6.32-300.38.1.el5uek or higher.
This issue was patched in ELSA-2012-2041
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-uek-debug
package and not the kernel-uek-debug
package as distributed by Oracle
.
See How to fix?
for Oracle:5
relevant fixed versions and status.
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
References
- https://linux.oracle.com/cve/CVE-2012-3412.html
- https://linux.oracle.com/errata/ELSA-2012-1323.html
- https://linux.oracle.com/errata/ELSA-2012-1323-1.html
- https://linux.oracle.com/errata/ELSA-2012-2038.html
- https://linux.oracle.com/errata/ELSA-2012-2039.html
- https://linux.oracle.com/errata/ELSA-2012-2040.html
- https://linux.oracle.com/errata/ELSA-2012-2041.html
- https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c
- https://bugzilla.redhat.com/show_bug.cgi?id=844714
- http://www.openwall.com/lists/oss-security/2012/08/03/4
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30
- http://www.ubuntu.com/usn/USN-1568-1
- http://rhn.redhat.com/errata/RHSA-2012-1375.html
- http://www.ubuntu.com/usn/USN-1580-1
- http://www.ubuntu.com/usn/USN-1567-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html
- http://www.ubuntu.com/usn/USN-1572-1
- http://www.ubuntu.com/usn/USN-1579-1
- http://rhn.redhat.com/errata/RHSA-2012-1430.html
- https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
- http://rhn.redhat.com/errata/RHSA-2012-1401.html
- http://www.ubuntu.com/usn/USN-1577-1
- http://www.ubuntu.com/usn/USN-1575-1
- http://rhn.redhat.com/errata/RHSA-2012-1347.html
- http://rhn.redhat.com/errata/RHSA-2012-1323.html
- http://www.ubuntu.com/usn/USN-1578-1
- http://rhn.redhat.com/errata/RHSA-2012-1324.html
- http://secunia.com/advisories/50633
- http://secunia.com/advisories/50732
- http://secunia.com/advisories/50811
- http://secunia.com/advisories/51193
- https://access.redhat.com/errata/RHSA-2012:1323
- https://access.redhat.com/errata/RHSA-2012:1324
- https://access.redhat.com/errata/RHSA-2012:1347
- https://access.redhat.com/errata/RHSA-2012:1366
- https://access.redhat.com/errata/RHSA-2012:1375
- https://access.redhat.com/errata/RHSA-2012:1401
- https://access.redhat.com/errata/RHSA-2012:1430
- https://access.redhat.com/security/cve/CVE-2012-3412